Analysis and Comparison of Typical Reversible Watermarking Methods
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 333-347
- https://doi.org/10.1007/11922841_27
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Reversible data hidingIEEE Transactions on Circuits and Systems for Video Technology, 2006
- Lossless watermarking for image authentication: a new framework and an implementationIEEE Transactions on Image Processing, 2006
- Reversible data embedding into images using wavelet techniques and sortingIEEE Transactions on Image Processing, 2005
- Reversible data embedding using a difference expansionIEEE Transactions on Circuits and Systems for Video Technology, 2003
- Circular interpretation of bijective transformations in lossless watermarking for media asset managementIEEE Transactions on Multimedia, 2003
- Wavelet-based reversible watermarking for authenticationPublished by SPIE-Intl Soc Optical Eng ,2002
- Distortion-Free Data Embedding for ImagesLecture Notes in Computer Science, 2001
- Secret and public key image watermarking schemes for image authentication and ownership verificationIEEE Transactions on Image Processing, 2001
- Invertible authenticationPublished by SPIE-Intl Soc Optical Eng ,2001
- Arithmetic coding revisitedACM Transactions on Information Systems, 1998